Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #601  
Old 01-24-2013, 18:28
*RemedY* *RemedY* is offline
Family
 
Join Date: Sep 2003
Posts: 115
Rept. Given: 18
Rept. Rcvd 72 Times in 30 Posts
Thanks Given: 0
Thanks Rcvd at 3 Times in 3 Posts
*RemedY* Reputation: 72
Hi fellows,

here is a site full of any kind of IT books.
It offers even fast, unlimited direct downloads from the site, thus no shared host hassle.

Code:
http://it-ebooks.info/
Enjoy.

Regards
*RemedY*

Last edited by *RemedY*; 01-24-2013 at 18:39. Reason: Sorry, forgot the link :-(
Reply With Quote
The Following 4 Users Gave Reputation+1 to *RemedY* For This Useful Post:
chessgod101 (01-25-2013), nikkapedd (01-25-2013), RedBlkJck (01-26-2013), xtiaoshi (01-25-2013)
  #602  
Old 01-26-2013, 02:36
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
mega tutorials

this one found by my friend khonel_00



Reply With Quote
  #603  
Old 01-28-2013, 01:22
bilbo bilbo is offline
Friend
 
Join Date: Jul 2004
Posts: 103
Rept. Given: 36
Rept. Rcvd 15 Times in 12 Posts
Thanks Given: 15
Thanks Rcvd at 17 Times in 11 Posts
bilbo Reputation: 15
Gentoomen Library

3616 files and 35 GB covering everything from Algorithms to XML.

You can get them one by one too, but only via Torrent.
HERE is the list, and HERE is the unique torrent link

Best regards, bilbo
Reply With Quote
The Following 3 Users Gave Reputation+1 to bilbo For This Useful Post:
chessgod101 (01-28-2013), Dreamer (01-28-2013), Wannabe (02-04-2013)
  #604  
Old 02-05-2013, 23:56
mr.slooz mr.slooz is offline
Friend
 
Join Date: Feb 2004
Location: Ankh-Morpork
Posts: 41
Rept. Given: 8
Rept. Rcvd 4 Times in 3 Posts
Thanks Given: 0
Thanks Rcvd at 1 Time in 1 Post
mr.slooz Reputation: 4
Ross Anderson - Security Engineering, second edition for free

hxxp://www.cl.cam.ac.uk/~rja14/book.html
Reply With Quote
  #605  
Old 02-19-2013, 02:52
nikkapedd nikkapedd is offline
VIP
 
Join Date: Mar 2011
Location: ::Bratva::
Posts: 275
Rept. Given: 275
Rept. Rcvd 151 Times in 65 Posts
Thanks Given: 203
Thanks Rcvd at 276 Times in 112 Posts
nikkapedd Reputation: 100-199 nikkapedd Reputation: 100-199
Professional Visual Studio 2012
Publisher: Wrox | 2012 | EPUB + PDF | ISBN: 1118337700 | 1104 pages | 16.9 + 45.4 Mb
Code:
pdf
http://uploaded.net/file/xxu86em4/19022013_03_PDF_Sheva370.rar

epub
http://uploaded.net/file/7vhpivb7/19022013_03_EPUB_Sheva370.rar
Reply With Quote
The Following User Gave Reputation+1 to nikkapedd For This Useful Post:
chessgod101 (02-22-2013)
  #606  
Old 02-21-2013, 20:12
rangga rangga is offline
Friend
 
Join Date: Feb 2009
Posts: 53
Rept. Given: 13
Rept. Rcvd 22 Times in 15 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
rangga Reputation: 22
I hope somebody could share this one -- "Real Digital Forensics: Computer Security and Incident Response". ---Thx.
Reply With Quote
  #607  
Old 03-04-2013, 09:25
*RemedY* *RemedY* is offline
Family
 
Join Date: Sep 2003
Posts: 115
Rept. Given: 18
Rept. Rcvd 72 Times in 30 Posts
Thanks Given: 0
Thanks Rcvd at 3 Times in 3 Posts
*RemedY* Reputation: 72
List of all books

Hi there,

some weeks ago I've posted a link to it-ebooks.info. A site with direct ebooks downloads. One shortcoming of this site is the lack of a browsable index. This makes it hard to look for a certain topic and in general it's just inconvenient.
To overcome this issue I've created a tiny Python script that creates the index - consisting of title, second title (if there is any), description, and clickable download link. I hope you'll find it useful.
I have also put the script itself in the .rar file so you can adjust it if you want the index to be different.

Best regards
*RemedY*
Attached Files
File Type: rar index_with_script.rar (354.8 KB, 17 views)
Reply With Quote
The Following User Gave Reputation+1 to *RemedY* For This Useful Post:
korosh (03-04-2013)
  #608  
Old 03-08-2013, 12:23
nguoidocsach
 
Posts: n/a
Stuxnet: The True Story Of Hunt And Evolution
Publication Date: February 18, 2013
http://d188rgcu4zozwl.cloudfront.net/content/B00BJ6KPLS/images/cover.jpg

This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and defenselessness of industrial computers to an existence of ¡°gray¡± market of pre-written software vulnerabilities for sale. Overall, the story of Stuxnet is a story of its evolution from an ordinary malware to a cyber-weapon that was followed by its major transformation into a successful long-term propaganda-weapon.

The appearance of Stuxnet that was loaded with two digital certificates and four previously unknown breaches in Window¡¯s defense raised some painful questions. Who was behind Stuxnet? For how long was this cyber-war going on? Are secure Internet transactions really secure? Can we trust digital certificates? Who is in the business of creating and selling malware to penetrate Internet browsers¡¯ security? The story of the computer worm Stuxnet is full of surprises and unexpected twists that might change your opinion about the present and future of the Internet and the World Wide Web.
Reply With Quote
  #609  
Old 03-22-2013, 04:30
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
Sams - Covert Java Techniques for Decompiling, Patching,and Reverse Engineering

Description:
The book gives some practical methods of how to overcome the many problems:
Decompile, and confusion;
Decipher the private variables and methods;
Alternative and patch application class;
Eavesdropping technology simplifies troubleshooting and performance tuning;
The interception control flow and control class loading;

Description:
The book gives some practical methods of how to overcome the many problems:
Decompile, and confusion;
Decipher the private variables and methods;
Alternative and patch application class;
Eavesdropping technology simplifies troubleshooting and performance tuning;
The interception control flow and control class loading;
Understand and adjust bytecode;
Change the third-party application logic;
Decipher the behavior of the JVM;
To protect the commercial software from decipher;
Some of the tips mentioned in this book can help you save time and improve efficiency. Each chapter focusing on the kind of technology to solve a class of problems overview of where the problem lies, given the solution of the problem, and then give other idea to test the program.

[Contents]
Chapter 1 Getting Started Guide
1.1 Summary - time and purpose of using the various methods
1.2 use of document management to improve the efficiency of program development
1.2.1 FAR 和 Total Commander
1.2.2 Java IDE
1.3 the function and structure of the sample application
1.4 quick test
1.5 Summary
Chapter 2 decompiled class
2.1 determine when to decompile
2.2 understand the best anti-compiler
2.3 decompiled class
2.4 decompile feasible elements
2.5 decompiled code potential problems
2.6 quick test
2.7 Summary
Chapter 3 of confusion classes
3.1 protection code behind the idea
3.2 Confusion - kind of intellectual property protection
3.3 the transformation of the program executed by the confusion
3.3.1 remove debugging information
3.3.2 The name of the processing
3.3.3 coding Java string
3.3.4 change control flow
3.3.5 insert the correct code
3.3.6 remove unused code (compression)
3.3.7 optimized bytecode
3.4 understand the confusion
The 3.5 potential problems and common solutions
3.5.1 Dynamic Class Loading
3.5.2 reflection
3.5.3 serialization
3.5.4 violate naming conventions
3.5.5 maintenance problems
3.6 è¿ç”¨ Zelix KlassMaster æ··æ·† 一个 Chat 应用 程åº
3.7 to crack the code of confusion
3.8 quick test
3.9 Summary
Chapter 4 decipher non-public methods and variables
4.1 package
4.2 access package and a member of the protected class
4.3 access private class members
4.4 quick test
4.5 Summary
Chapter 5 replacement and repair applications
5.1 After various attempts have failed should do
5.2 to find the class must be patched
5.2.1 common method
5.2.2 Search text string
5.2.3 obfuscated code processing
5.3 an example of a need to repair
5.3.1 using the class name
5.3.2 Search text string
5.3.3 use the call stack search program logic
5.4 patched classes to provide new logic
5.5 refactoring applications to load and use the repair class
5.6 patch package package
5.7 quick test
5.8 Summary
Chapter 6 uses tracking technology
Chapter 7 Java security
Chapter 8 spy runtime environment
Chapter 9 decipher coded informal debugger
Chapter 10, the use of performance analysis tools to analyze applications running
Chapter 11, the use of positioning and correction of the load test scalability problem
Chapter 12 Application of Reverse Engineering
Chapter 13 eavesdropping technology
Chapter 14 of the control class loading
Chapter 15 alternative and patch core Java classes
Chapter 16 interception control flow
Chapter 17 to understand and adjust bytecode
Chapter 18, the use of native code patching method for total control
Chapter 19 protection commercial program from crack to
Appendix A commercial software license
Appendix B Resources
Appendix C Test Questions

Ps: downloaded from Unppack.cn


Sams - Covert Java Techniques for Decompiling, Patching,and Reverse Engineering.part1.rar

Sams - Covert Java Techniques for Decompiling, Patching,and Reverse Engineering.part2.rar
Reply With Quote
The Following 5 Users Gave Reputation+1 to Dreamer For This Useful Post:
bilbo (04-18-2013), nikkapedd (03-24-2013), smo (04-05-2013), wilson bibe (04-17-2013)
  #610  
Old 04-02-2013, 01:35
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
lot of books



Reply With Quote
The Following User Gave Reputation+1 to Dreamer For This Useful Post:
wilson bibe (04-17-2013)
  #611  
Old 04-05-2013, 02:43
smo smo is offline
Friend
 
Join Date: Mar 2002
Posts: 25
Rept. Given: 9
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 0
Thanks Rcvd at 0 Times in 0 Posts
smo Reputation: 1
Does anyone have an ebook about Kerberos?
Reply With Quote
  #612  
Old 04-05-2013, 05:02
nikre's Avatar
nikre nikre is offline
VIP
 
Join Date: Sep 2011
Posts: 180
Rept. Given: 177
Rept. Rcvd 100 Times in 35 Posts
Thanks Given: 1
Thanks Rcvd at 10 Times in 10 Posts
nikre Reputation: 100-199 nikre Reputation: 100-199
what book for Kerberos?
this just api monitor bro
Reply With Quote
  #613  
Old 04-05-2013, 15:07
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
here is what google say


Reply With Quote
  #614  
Old 04-16-2013, 21:31
typedef
 
Posts: n/a
Anyone know where I can get this book?

http://www.amazon.com/gp/product/0321578899?ie=UTF8&tag=advancenetdeb-20&linkCode=as2&camp=1789&creative=390957&creativeASIN=0321578899

I can't find it on the forum. I've search, but there's nothing. It looks awesome.
Reply With Quote
  #615  
Old 04-17-2013, 01:18
arnix arnix is offline
Friend
 
Join Date: Feb 2005
Posts: 68
Rept. Given: 11
Rept. Rcvd 18 Times in 7 Posts
Thanks Given: 2
Thanks Rcvd at 6 Times in 4 Posts
arnix Reputation: 18
Quote:
Originally Posted by typedef View Post
Anyone know where I can get this book?

http://www.amazon.com/gp/product/0321578899

I can't find it on the forum. I've search, but there's nothing. It looks awesome.
hxxp://rghost.net/45337823

password: the result of 12345678 xor 87654321
Reply With Quote
The Following User Gave Reputation+1 to arnix For This Useful Post:
wilson bibe (04-17-2013)
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
ebooks conan981 General Discussion 0 07-07-2006 22:36
some ebooks fulone General Discussion 1 05-20-2004 21:22


All times are GMT +8. The time now is 22:20.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )